LogoLogo
search
⌘Ctrlk
  • Pentaho Documentation
LogoLogo
  • Administer Pentaho Data Integration and Analytics 11.0
    • Manage the Pentaho system
    • Secure the Pentaho system
      • User security
      • Big data security
        • Kerberos authentication versus secure impersonation
          • How to enable secure impersonation
          • How to enable Kerberos authentication
          • Prerequisites
          • Supported components
        • Pentaho and CDP security
    • Optimize the Pentaho system
    • Legacy optimization pages
    • Troubleshoot the Pentaho system
    • Developer center
    • platform-javascript-apis
    • Customize Pentaho products
    • Embed and extend Pentaho functionality
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Administer Pentaho Data Integration and Analytics 11.0chevron-right
  2. Secure the Pentaho systemchevron-right
  3. Big data security

Kerberos authentication versus secure impersonation

How to enable secure impersonationchevron-rightHow to enable Kerberos authenticationchevron-rightPrerequisiteschevron-rightSupported componentschevron-right
PreviousBig data securitychevron-leftNextHow to enable secure impersonationchevron-right

Last updated 7 months ago

Was this helpful?

LogoLogo

About

  • Pentaho.com

Support

  • Pentaho Support

Resources

  • Privacy

© 2025 Hitachi Vantara LLC

Was this helpful?